نتایج جستجو برای: secrecy

تعداد نتایج: 5023  

Journal: :Ethnologia Fennica 2019

Journal: :Utrecht Law Review 2011

Journal: :Index on Censorship 2010

Journal: :CoRR 2012
Anne-Maria Ernvall-Hytönen

We show that on an n = 24m+ 8k-dimensional even unimodular lattice, if the shortest vector length is ≥ 2m, then as the number of vectors of length 2m decreases, the secrecy gain increases. We will also prove a similar result on general unimodular lattices. Furthermore, assuming the conjecture by Belfiore and Solé, we will calculate the difference between inverses of secrecy gains as the number ...

2002
Kohei Honda

This note proves noninterference results (NI) for the secrecy analyses for LA and LAM presented in [1], using the inductive information ow analysis. This ow analysis is related to the secrecy typing in [1] in that, while the latter ensures safety of information ow, the former extracts ow of information. The presentation and study of ow analysis is restricted to its use in NI proofs: further stu...

2014
O. Ozan Koyluoglu Yanling Chen Aydin Sezgin

In this paper, we study the problem of secure communication over the broadcast channel with receiver side information, under the lens of individual secrecy constraints (i.e., information leakage from each message to an eavesdropper is made vanishing). Several coding schemes are proposed by extending known results in broadcast channels to this secrecy setting. In particular, individual secrecy p...

2008
Hanane Houmani Mohamed Mejri

This paper gives a novel approach to verify the secrecy property of cryptographic protocols under equational theories. Indeed, by using the notion of interpretation functions, this paper presents some sufficient and practical conditions allowing to guarantee the secrecy property of cryptographic protocols under any equational theory. An interpretation function is a safe means by which an agent ...

2012
Eduard A. Jorswieck Sabrina Gerbracht Anne Wolf

This chapter provides a comprehensive state-of-the-art description of the emerging field of physical layer security. We will consider wireless security from an information theoretic view, which allows us to talk about provable secrecy and to derive ultimate secrecy limits. Our main focus is on the optimization of transmit strategies and resource allocation schemes under secrecy constraints. We ...

2001
Pablo Giambiagi John Mullins

Giambiagi, P. 2001: Secrecy for Mobile Implementations of Security Protocols. TRITA-IT AVH 01:05, Department of Microelectronics and Information Technology, Stockholm.ISSN 1403-5286. Mobile code technology offers interesting possibilities to the practitioner, but also raises strong concerns about security. One aspect of security is secrecy, the preservation of confidential information. This the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید